Networking & Cloud Computing
epub |eng | 2012-06-21 | Author:Sean Bodmer
Deception Is Essential The computer security business in both the public and private sectors is led by an important and influential group of people who know so little about so ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub |eng | | Author:Gilberto Nájera-Gutiérrez
( Category:
Networking & Cloud Computing
January 3,2018 )
epub, pdf |eng | 2015-08-07 | Author:Michael Gregg
Key Terms Active Directory—A Windows implementation of a hierarchical directory service that is LDAP compliant. Brute-force attack—A method of breaking a cipher or encrypted value by trying a large number ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub, pdf |eng | 2012-02-27 | Author:Edward Amoroso
Figure 7.1 Size comparison issues in a trusted computing base. A major consideration in the protection of national infrastructure thus becomes how to manage, promote, and ensure proper human discretion ...
( Category:
Management & Leadership
January 3,2018 )
epub |eng | 2014-01-03 | Author:Sood, Aditya, Enbody, Richard & Richard Enbody
Inline hooking Inline hooking allows the attackers to overwrite the first few bytes of target function and place a jump instruction that redirects the execution flow to the attacker controlled ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub, mobi |eng | 2016-12-27 | Author:admin
Пета глава След като Клариса се изкъпа, една прислужница закопча, завърза и закрепи с карфици взетата назаем рокля. Въпреки че моделът беше от преди две години, роклята от слонова кост, ...
( Category:
Networking & Cloud Computing
January 2,2018 )
epub |eng | 2015-04-19 | Author:Asghar Ghori [Ghori, Asghar]
( Category:
Operating Systems
January 2,2018 )
azw3, epub, mobi |eng | 2017-07-21 | Author:Manish Sethi [Sethi, Manish]
Summary In this chapter, you learned how to structure our application by using the Flux pattern, and we also got an understanding of the different concepts of Flux, such as ...
( Category:
Networking & Cloud Computing
January 2,2018 )
epub |eng | | Author:Abdelmonam Kouka
The Samba server Samba is a program that implements SMB and CIFS, the Windows file-sharing protocols. As such, it's ideal as a platform to share file under Windows, since all ...
( Category:
Operating Systems
January 2,2018 )
epub |eng | 1984-01-01 | Author:Steven Levy [Levy, Steven]
Chapter 12. Woz Steve Wozniak did not sit near the front of the SLAC auditorium along with Lee Felsenstein during Homebrew meetings. His participation in the mapping sessions were infrequent. ...
( Category:
History & Culture
December 30,2017 )
mobi |eng | 2015-04-24 | Author:Lyn., Kevin [Lyn., Kevin]
Horizontal Definition Lists with Bootstrap You might need to create a list of terms accompanied by their description. This is much easy with bootstrap. The bootstrap’s class .dl-horizontal is used ...
( Category:
Web Development & Design
December 30,2017 )
epub |eng | 2015-04-24 | Author:Lyn., Kevin
Horizontal Definition Lists with Bootstrap You might need to create a list of terms accompanied by their description. This is much easy with bootstrap. The bootstrap’s class .dl-horizontal is used ...
( Category:
Web Development & Design
December 30,2017 )
epub |eng | | Author:Massimo Tornatore, Gee-Kung Chang & Georgios Ellinas
7.3.1 SDN-Based Control in Fiber Wireless Networks It is noted that the technology-agnostic nature of SDN is quite important in SDN applications to fiber wireless networks since they can rely ...
( Category:
Engineering
December 30,2017 )
epub |eng | 2016-05-30 | Author:Jim Bronskill & David McKie [Jim Bronskill]
2. In Your Vehicle Your family vehicle is learning more about who’s behind the wheel — everything from where you like to shop to how hard you brake — as ...
( Category:
Security & Encryption
December 30,2017 )
azw3 |eng | 2015-05-29 | Author:Dr. Edward Lavieri [Lavieri, Dr. Edward]
Summary In this chapter, you learned how to add life to your game with the use of animations. You gained experience with first and third person controllers and learned about ...
( Category:
Software
December 30,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6860)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6859)
Running Windows Containers on AWS by Marcio Morales(6386)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5080)
Combating Crime on the Dark Web by Nearchos Nearchou(4656)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4639)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4344)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3902)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3566)
Learn Wireshark by Lisa Bock(3550)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3358)
Blockchain Basics by Daniel Drescher(3329)
